ITM 301 Lecture Notes - Lecture 9: Black Hat, Data Loss Prevention Software, Usb Flash Drive

24 views6 pages

Document Summary

Security risks: hacker, originally meant someone who masters the inner workings of computer hardware and software in an effort to better understand them. Today, hacker is used to describe an individual who gains unauthorized access to systems: hacker categories, white hat hacker i t security experts hired by organizations to identify security vulnerabilities. Sometimes called an ethical hacker: black hat hacker groups or individuals that cause damage, steal data, or compromise privacy, gray hat hacker abide by a code of ethics all their own. Might engage in illegal activity but their intent is to educate and assist: vulnerability, weakness of a system, process, or architecture. Exploit: means of taking advantage of a vulnerability. Exploit before software developer is aware of the vulnerability. People risks: more than half of all security breaches are caused by human errors, ignorance, and omissions. Tailgating: the attacker uses authorized people to get unauthorize entry in an organization.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents